Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
51s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 11:06
Behavioral task
behavioral1
Sample
c0d2835ed1ba24be8bc7822f7a4dc065730952cf829bc8ec53efd52c4a8ec96c.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
c0d2835ed1ba24be8bc7822f7a4dc065730952cf829bc8ec53efd52c4a8ec96c.exe
Resource
win10v2004-20221111-en
General
-
Target
c0d2835ed1ba24be8bc7822f7a4dc065730952cf829bc8ec53efd52c4a8ec96c.exe
-
Size
70KB
-
MD5
8f85727a9c588760c35b07e5b8fdef95
-
SHA1
6e868ad886e80b77917ed4d6533f1cf532c4501a
-
SHA256
c0d2835ed1ba24be8bc7822f7a4dc065730952cf829bc8ec53efd52c4a8ec96c
-
SHA512
2645b820a7e1a04353553895add314052fc791eb8e4e6ac10adfff010b9438b27e9b4c1b02b9f089044d532ed42237b4ff388cec256cbfdb58baca621e929ddb
-
SSDEEP
1536:rXDZWlNkY/NAfA74SLLz283tkAz857lqjFmM1xd7AZ/BV9Qbg:rX1WlVCBsX9PMEBc1l
Malware Config
Signatures
-
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt = "1" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
Executes dropped EXE 1 IoCs
pid Process 1776 explorer.exe -
Sets file execution options in registry 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AvastU3.exe\Debugger = "ntsd -d" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AntiU.exe\Debugger = "ntsd -d" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\irsetup.exe explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SysSafe.exe\Debugger = "ntsd -d" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KASTask.exe explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\irsetup.exe\Debugger = "ntsd -d" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SmartUp.exe\Debugger = "ntsd -d" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Trojanwall.exe explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\QQDoctorRtp.exe explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\qheart.exe\Debugger = "ntsd -d" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WoptiClean.exe explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nod32krn.exe explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\upiea.exe\Debugger = "ntsd -d" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\QQSC.exe explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ghost.exe\Debugger = "ntsd -d" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\XP.exe explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sxgame.exe\Debugger = "ntsd -d" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ScanU3.exe explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\runiep.exe explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AgentSvr.exe explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KRegEx.exe explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\UpLive.exe\Debugger = "ntsd -d" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ghost.exe explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kpfw32.exe explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\~.exe explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RavMon.exe\Debugger = "ntsd -d" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\FTCleanerShell.exe explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KvfwMcl.exe explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\shcfg32.exe\Debugger = "ntsd -d" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kmailmon.exe explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SDGames.exe explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avp.exe\Debugger = "ntsd -d" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nod32.exe\Debugger = "ntsd -d" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360rp.exe\Debugger = "ntsd -d" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVSrvXP.exe\Debugger = "ntsd -d" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KWatch9x.exe\Debugger = "ntsd -d" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\servet.exe\Debugger = "ntsd -d" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360Safe.exe explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\UmxAgent.exe\Debugger = "ntsd -d" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\safeboxTray.exe\Debugger = "ntsd -d" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KPFW32.exe\Debugger = "ntsd -d" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\webscanx.exe explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVMonXP_1.kxp\Debugger = "ntsd -d" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PFW.exe explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ScanFrm.exe explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avp.com explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SelfUpdate.exe\Debugger = "ntsd -d" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\EGHOST.exe\Debugger = "ntsd -d" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KMailMon.exe explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KWatch9x.exe explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\safelive.exe explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pagefile.pif explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SDGames.exe\Debugger = "ntsd -d" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\799d.exe\Debugger = "ntsd -d" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\webscanx.exe\Debugger = "ntsd -d" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVMonXP.kxp\Debugger = "ntsd -d" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\shcfg32.exe explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\TrojanDetector.exe\Debugger = "ntsd -d" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Navapsvc.exe explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KISLnchr.exe explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KMFilter.exe\Debugger = "ntsd -d" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVStub.kxp explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KRepair.com\Debugger = "ntsd -d" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HijackThis.exe explorer.exe -
resource yara_rule behavioral1/files/0x0008000000005c51-56.dat upx behavioral1/files/0x0008000000005c51-58.dat upx behavioral1/files/0x0008000000005c51-55.dat upx behavioral1/memory/1204-60-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral1/memory/1776-63-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral1/memory/1204-65-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral1/files/0x0008000000005c51-66.dat upx behavioral1/memory/1776-67-0x0000000000400000-0x0000000000450000-memory.dmp upx -
Drops startup file 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\1681.lnk explorer.exe -
Loads dropped DLL 3 IoCs
pid Process 1204 c0d2835ed1ba24be8bc7822f7a4dc065730952cf829bc8ec53efd52c4a8ec96c.exe 1204 c0d2835ed1ba24be8bc7822f7a4dc065730952cf829bc8ec53efd52c4a8ec96c.exe 1776 explorer.exe -
Enumerates connected drives 3 TTPs 44 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\p: c0d2835ed1ba24be8bc7822f7a4dc065730952cf829bc8ec53efd52c4a8ec96c.exe File opened (read-only) \??\g: explorer.exe File opened (read-only) \??\i: c0d2835ed1ba24be8bc7822f7a4dc065730952cf829bc8ec53efd52c4a8ec96c.exe File opened (read-only) \??\o: c0d2835ed1ba24be8bc7822f7a4dc065730952cf829bc8ec53efd52c4a8ec96c.exe File opened (read-only) \??\m: explorer.exe File opened (read-only) \??\s: explorer.exe File opened (read-only) \??\t: explorer.exe File opened (read-only) \??\q: c0d2835ed1ba24be8bc7822f7a4dc065730952cf829bc8ec53efd52c4a8ec96c.exe File opened (read-only) \??\y: c0d2835ed1ba24be8bc7822f7a4dc065730952cf829bc8ec53efd52c4a8ec96c.exe File opened (read-only) \??\n: c0d2835ed1ba24be8bc7822f7a4dc065730952cf829bc8ec53efd52c4a8ec96c.exe File opened (read-only) \??\r: c0d2835ed1ba24be8bc7822f7a4dc065730952cf829bc8ec53efd52c4a8ec96c.exe File opened (read-only) \??\k: explorer.exe File opened (read-only) \??\r: explorer.exe File opened (read-only) \??\x: explorer.exe File opened (read-only) \??\g: c0d2835ed1ba24be8bc7822f7a4dc065730952cf829bc8ec53efd52c4a8ec96c.exe File opened (read-only) \??\m: c0d2835ed1ba24be8bc7822f7a4dc065730952cf829bc8ec53efd52c4a8ec96c.exe File opened (read-only) \??\l: c0d2835ed1ba24be8bc7822f7a4dc065730952cf829bc8ec53efd52c4a8ec96c.exe File opened (read-only) \??\s: c0d2835ed1ba24be8bc7822f7a4dc065730952cf829bc8ec53efd52c4a8ec96c.exe File opened (read-only) \??\t: c0d2835ed1ba24be8bc7822f7a4dc065730952cf829bc8ec53efd52c4a8ec96c.exe File opened (read-only) \??\e: explorer.exe File opened (read-only) \??\u: explorer.exe File opened (read-only) \??\h: c0d2835ed1ba24be8bc7822f7a4dc065730952cf829bc8ec53efd52c4a8ec96c.exe File opened (read-only) \??\j: c0d2835ed1ba24be8bc7822f7a4dc065730952cf829bc8ec53efd52c4a8ec96c.exe File opened (read-only) \??\z: c0d2835ed1ba24be8bc7822f7a4dc065730952cf829bc8ec53efd52c4a8ec96c.exe File opened (read-only) \??\y: explorer.exe File opened (read-only) \??\z: explorer.exe File opened (read-only) \??\k: c0d2835ed1ba24be8bc7822f7a4dc065730952cf829bc8ec53efd52c4a8ec96c.exe File opened (read-only) \??\u: c0d2835ed1ba24be8bc7822f7a4dc065730952cf829bc8ec53efd52c4a8ec96c.exe File opened (read-only) \??\q: explorer.exe File opened (read-only) \??\w: explorer.exe File opened (read-only) \??\w: c0d2835ed1ba24be8bc7822f7a4dc065730952cf829bc8ec53efd52c4a8ec96c.exe File opened (read-only) \??\f: explorer.exe File opened (read-only) \??\j: explorer.exe File opened (read-only) \??\l: explorer.exe File opened (read-only) \??\e: c0d2835ed1ba24be8bc7822f7a4dc065730952cf829bc8ec53efd52c4a8ec96c.exe File opened (read-only) \??\f: c0d2835ed1ba24be8bc7822f7a4dc065730952cf829bc8ec53efd52c4a8ec96c.exe File opened (read-only) \??\h: explorer.exe File opened (read-only) \??\i: explorer.exe File opened (read-only) \??\n: explorer.exe File opened (read-only) \??\o: explorer.exe File opened (read-only) \??\p: explorer.exe File opened (read-only) \??\v: explorer.exe File opened (read-only) \??\v: c0d2835ed1ba24be8bc7822f7a4dc065730952cf829bc8ec53efd52c4a8ec96c.exe File opened (read-only) \??\x: c0d2835ed1ba24be8bc7822f7a4dc065730952cf829bc8ec53efd52c4a8ec96c.exe -
Drops file in Program Files directory 6 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\Microsoft Shared\explorer.exe c0d2835ed1ba24be8bc7822f7a4dc065730952cf829bc8ec53efd52c4a8ec96c.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\explorer.exe c0d2835ed1ba24be8bc7822f7a4dc065730952cf829bc8ec53efd52c4a8ec96c.exe File opened for modification C:\Program Files (x86)\Common Files\uiui8.dll explorer.exe File created C:\Program Files (x86)\Common Files\uiui8.dll explorer.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\explorer.exe explorer.exe File opened for modification C:\Program Files (x86)\Common Files explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt = "1" explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1204 c0d2835ed1ba24be8bc7822f7a4dc065730952cf829bc8ec53efd52c4a8ec96c.exe 1776 explorer.exe 1776 explorer.exe 1776 explorer.exe 1776 explorer.exe 1776 explorer.exe 1776 explorer.exe 1776 explorer.exe 1776 explorer.exe 1776 explorer.exe 1776 explorer.exe 1776 explorer.exe 1776 explorer.exe 1776 explorer.exe 1776 explorer.exe 1776 explorer.exe 1776 explorer.exe 1776 explorer.exe 1776 explorer.exe 1776 explorer.exe 1776 explorer.exe 1776 explorer.exe 1776 explorer.exe 1776 explorer.exe 1776 explorer.exe 1776 explorer.exe 1776 explorer.exe 1776 explorer.exe 1776 explorer.exe 1776 explorer.exe 1776 explorer.exe 1776 explorer.exe 1776 explorer.exe 1776 explorer.exe 1776 explorer.exe 1776 explorer.exe 1776 explorer.exe 1776 explorer.exe 1776 explorer.exe 1776 explorer.exe 1776 explorer.exe 1776 explorer.exe 1776 explorer.exe 1776 explorer.exe 1776 explorer.exe 1776 explorer.exe 1776 explorer.exe 1776 explorer.exe 1776 explorer.exe 1776 explorer.exe 1776 explorer.exe 1776 explorer.exe 1776 explorer.exe 1776 explorer.exe 1776 explorer.exe 1776 explorer.exe 1776 explorer.exe 1776 explorer.exe 1776 explorer.exe 1776 explorer.exe 1776 explorer.exe 1776 explorer.exe 1776 explorer.exe 1776 explorer.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1776 explorer.exe Token: SeDebugPrivilege 1776 explorer.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1776 explorer.exe 1776 explorer.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1204 wrote to memory of 1776 1204 c0d2835ed1ba24be8bc7822f7a4dc065730952cf829bc8ec53efd52c4a8ec96c.exe 27 PID 1204 wrote to memory of 1776 1204 c0d2835ed1ba24be8bc7822f7a4dc065730952cf829bc8ec53efd52c4a8ec96c.exe 27 PID 1204 wrote to memory of 1776 1204 c0d2835ed1ba24be8bc7822f7a4dc065730952cf829bc8ec53efd52c4a8ec96c.exe 27 PID 1204 wrote to memory of 1776 1204 c0d2835ed1ba24be8bc7822f7a4dc065730952cf829bc8ec53efd52c4a8ec96c.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\c0d2835ed1ba24be8bc7822f7a4dc065730952cf829bc8ec53efd52c4a8ec96c.exe"C:\Users\Admin\AppData\Local\Temp\c0d2835ed1ba24be8bc7822f7a4dc065730952cf829bc8ec53efd52c4a8ec96c.exe"1⤵
- Loads dropped DLL
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Program Files (x86)\Common Files\Microsoft Shared\explorer.exe"C:\Program Files (x86)\Common Files\Microsoft Shared\explorer.exe"2⤵
- Modifies system executable filetype association
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Sets file execution options in registry
- Drops startup file
- Loads dropped DLL
- Enumerates connected drives
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1776
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD58f85727a9c588760c35b07e5b8fdef95
SHA16e868ad886e80b77917ed4d6533f1cf532c4501a
SHA256c0d2835ed1ba24be8bc7822f7a4dc065730952cf829bc8ec53efd52c4a8ec96c
SHA5122645b820a7e1a04353553895add314052fc791eb8e4e6ac10adfff010b9438b27e9b4c1b02b9f089044d532ed42237b4ff388cec256cbfdb58baca621e929ddb
-
Filesize
70KB
MD58f85727a9c588760c35b07e5b8fdef95
SHA16e868ad886e80b77917ed4d6533f1cf532c4501a
SHA256c0d2835ed1ba24be8bc7822f7a4dc065730952cf829bc8ec53efd52c4a8ec96c
SHA5122645b820a7e1a04353553895add314052fc791eb8e4e6ac10adfff010b9438b27e9b4c1b02b9f089044d532ed42237b4ff388cec256cbfdb58baca621e929ddb
-
Filesize
70KB
MD58f85727a9c588760c35b07e5b8fdef95
SHA16e868ad886e80b77917ed4d6533f1cf532c4501a
SHA256c0d2835ed1ba24be8bc7822f7a4dc065730952cf829bc8ec53efd52c4a8ec96c
SHA5122645b820a7e1a04353553895add314052fc791eb8e4e6ac10adfff010b9438b27e9b4c1b02b9f089044d532ed42237b4ff388cec256cbfdb58baca621e929ddb
-
Filesize
70KB
MD58f85727a9c588760c35b07e5b8fdef95
SHA16e868ad886e80b77917ed4d6533f1cf532c4501a
SHA256c0d2835ed1ba24be8bc7822f7a4dc065730952cf829bc8ec53efd52c4a8ec96c
SHA5122645b820a7e1a04353553895add314052fc791eb8e4e6ac10adfff010b9438b27e9b4c1b02b9f089044d532ed42237b4ff388cec256cbfdb58baca621e929ddb
-
Filesize
17KB
MD5bd5a19c3d0ad757b37dcaedce6869d1a
SHA11d0ac02fab810a042d68e515774d2f420af7c037
SHA256936118b10ccc2682c4382ee5273a61570767a64a8d31dc080528a7efb76872b4
SHA5129ff9d65f5935445f62fc8616fed791233b66dc07ccd52c3e7978895169fb828058bbc88a1d022ebfc27906b92b6a1973e9f19c35494ec6fcdef101c1f7a6cea6